Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Nevis Offers Free Assessment

Nevis is offering qualifying organizations a free Network Security Assessment

MOUNTAIN VIEW, Calif. -- Nevis Networks, a market leader in identity based persistent LAN security solutions, today announced it is offering qualifying organizations a free Network Security Assessment providing a detailed traffic analysis that can be delivered for individual LAN segments or on a network-wide basis. The free service leverages Nevis’ LANenforcer appliance to quickly identify how legitimate and malicious traffic patterns are affecting the network as well as determine systems that are non-compliant with company security policies.

"The LAN security assessment from Nevis provides enterprises with an opportunity to view the traffic profile of its clients in the least protected and most vulnerable area of the network—the Internal LAN,” said Michael Weinstein, CTO of Angel Computer Network Services, Inc., based in Wall, NJ. “This can expose previously unknown issues and provide an opportunity to mitigate risks before they get out of hand and possibly compromise the business. With LANenforcer's real-time and historical reporting, businesses can benefit from this powerful system as an auditing, compliance management and forensic analysis tool. Any organization concerned about the robustness and security of their LAN will benefit greatly from this assessment."

The free LAN security assessment is delivered over a two-week period starting with a comprehensive needs analysis. A comprehensive LAN security assessment report is provided with details providing:

  • all user names and MAC addresses accessing the network and the resources applications and services being accessed;
  • status of each endpoint’s operating system, anti-virus and anti-spyware;
  • disclosure of malware and malicious traffic traversing the network;
  • service and bandwidth utilization, including top 15 “talkers” on the LAN.

    Organizations qualifying for the LAN security assessment are those with at least 500 end users and a dedicated in-house IT security contact. The free LAN security assessment service will be available until September 1, 2007.

    “Without fail, our LAN security assessment service provides visibility into user activity, and uncovers malicious traffic, and compliance failures that LAN Security managers are simply unaware of,” said Nevis Networks COO Shane Buckley. “We’ve detected everything from operating system patch irregularities to malware brought into the network from unmanaged, mobile or external systems. In one instance we were able to identify and remove over 200Gbps of benign Malware activity going from the internal network to the internet, which translated into tangible ROI for the customer by saving further investment in additional, expensive perimeter security devices. The cliché ‘you can’t control what you can’t see’ is absolutely the case with LAN security and our assessment provides essential visibility with concise and actionable recommendations to improve the security posture, performance and availability of the enterprise network”

    Nevis’ LANenforcer solutions provide the enterprise with the ability to:

    • mitigate the risk from endpoint vulnerabilities—(NAC);
    • gain an understanding of who is accessing the network and control what they are doing—(Identity Based Access Control);
    • protect their core assets and IP from zero day malware and malicious attacks—(IPS);
    • reduce the overall costs of troubleshooting, incident resolution and auditing on the network without adversely affecting the end user experience—(Monitoring and Reporting).

    For more information about the free LAN security assessment from Nevis Networks, contact Don Otvos, sales manager, 650-254-2510 or visit: http://www.nevisnetworks.com/landing_pages.php?id=58

    Nevis Networks Inc.

     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/2/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-9498
    PUBLISHED: 2020-07-02
    Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
    CVE-2020-3282
    PUBLISHED: 2020-07-02
    A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
    CVE-2020-5909
    PUBLISHED: 2020-07-02
    In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
    CVE-2020-5910
    PUBLISHED: 2020-07-02
    In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
    CVE-2020-5911
    PUBLISHED: 2020-07-02
    In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.